Asian Journal of Information Technology
Year:
2016
Volume:
15
Issue:
4
Page No.
694 - 702
References
Al-Shurman, M., S.M. Yoo and S. Park, 2004. Black hole attack in mobile Ad Hoc networks. Proceedings of the 42nd Annual Southeast Regional Conference, April 2-3, 2004, Huntsville, AL. USA., pp: 96-97.
Burbank, J.L., P.F. Chimento, B.K. Haberman and W.T. Kasch, 2006. Key challenges of military tactical networking and the elusive promise of MANET technology. IEEE Commun. Mag., 44: 39-45.
CrossRef | Jaisankar, N., R. Saravanan and K.D. Swamy, 2010. A novel security approach for detecting black hole attack in MANET. Proceedings of the International Conference on Recent Trends in Business Administration and Information Processing, March 26-27, 2010, Thiruvananthapuram, India, pp: 217-223.
Joseph, J.F.C., A. Das, B.C. Seet and B.S. Lee, 2007. Cross layer versus single layer approaches for intrusion detection in MANETs. Proceedings of the 15th IEEE International Conference on Networks, November 19-21, 2007, Adelaide, SA., pp: 194-199.
Joseph, J.F.C., A. Das, B.C. Seet and B.S. Lee, 2008. CRADS: Integrated cross layer approach for detecting routing attacks in MANETs. Proceedings of the IEEE Wireless Communications and Networking Conference, March 31-April 3, 2008, Las Vegas, NV., USA., pp: 1525-1530.
Kannhavong, B., H. Nakayama, Y. Nemoto, N. Kato and A. Jamalipour, 2007. A survey of routing attacks in mobile Ad Hoc networks. IEEE Wireless Commun., 14: 85-91.
CrossRef | Lu, S., L. Li, K.Y. Lam and L. Jia, 2009. SAODV: A MANET routing protocol that can withstand black hole attack. Proceedings of the International Conference on Computational Intelligence and Security, Volume 2, December 11-14, 2009, Beijing, China, pp: 421-425.
Milanovic, N., M. Malek, A. Davidson and V. Milutinovic, 2004. Routing and security in mobile ad hoc networks. Computer, 37: 61-65.
CrossRef | Direct Link | Mistry, N., D.C. Jinwala and M. Zaveri, 2010. Improving AODV protocol against black hole attacks. Proceedings of the International MultiConference of Engineers and Computer Scientists, Volume 2, March 17-19, 2010, Hong Kong, pp: 1-6.
Nadeem, A. and M. Howarth, 2013. Protection of MANETs from a range of attacks using an intrusion detection and prevention system. Telecommun. Syst., 52: 2047-2058.
CrossRef | Direct Link | Pranusha, A. and G. Murali, 2015. A hybrid key management scheme for secure MANET communications. Int. J. Res. Eng. Technol., 4: 38-40.
Direct Link | Su, M.Y., 2011. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comp. Commun., 34: 107-117.
CrossRef | Direct Link | Tamilselvan, L. and V. Sankaranarayanan, 2007. Prevention of blackhole attack in MANET. Proceedings of the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, August 27-30, 2007, Sydney, Australia, pp: 21-.
Thamilarasu, G. and R. Sridhar, 2012. A cross-layer game for energy-efficient Jamming detection in ad hoc networks. Secur. Commun. Networks, 5: 364-373.
CrossRef | Yang, H., H. Luo, F. Ye, S. Lu and L. Zhang, 2004. Security in mobile ad hoc networks: Challenges and solutions. IEEE Wireless Commun., 11: 38-47.
CrossRef | Direct Link | Zhou, L. and Z.J. Haas, 1999. Securing Ad Hoc networks. IEEE Network, 13: 24-30.
CrossRef |